Hello
On Tue, Jan 04, 2011 at 07:57:25AM -0800, Jerry Scharf wrote:
> In my design for the command tool, I assumed that the choice of the
> database for auth server is a run time configuration command rather than
> a compiled in value. I was also told by Shane that this is configurable
> by zone rather than as a whole (which makes complete sense.)
Don't worry. This is only a debugging support. When the server is run from the
source tree (without installation), it has a different default path to the
database (which can be overwritten by configuration) than when it is installed.
It allows the software to be easily built and just run, without installation, to
speed up development. User should never come across it.
Have a nice day
--
Hello, I'm an extension to the infamous signature virus, called spymail.
Could you please copy me into your signature and send back what you were
doing last night between 10pm and 3am?
Michal 'vorner' Vaner
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 198 bytes
Desc: not available
URL: <https://lists.isc.org/pipermail/bind10-dev/attachments/20110104/aaf80697/attachment.bin>